August 2002, Volume 27, Number 4
Table of Contents
MOTD by Rob Kolstad (PDF)
APROPOS by Tina Darmohray (PDF)
OPINION
High Availability by Hobbit (PDF)
THE LAW
Computer Forensics by Erin Kenneally (PDF)
PROGRAMMING
Wide Characters by Glen McCluskey (PDF)
Practical Perl by Adam Turoff (PDF)
The Tclsh Spot by Clif Flynt (PDF)
SECURITY
Securing FTP by Gary Cohen (PDF)
Musings by Rik Farrow (PDF)
Identifying and Tracking Unauthorized 802.11 Cards and Access Points by Robert Foust (PDF)
Combating the Perils of Port 80 at the Firewall by Avishai Wool (PDF)
SYSADMIN
ISPAdmin by Robert Haskins (PDF)
The Problem of PORCMOLSULB by Howard Owen (PDF)
An Introduction to Dependability by David A. Patterson (PDF)
Monitoring Strategies for High-Availability Web Apps by Neil Ashizawa (PDF)
Ten Reasons to Monitor Your System by John Sellens (PDF)
If Systems Were Cars, Would Yours Be Doubled Parked? by Steven M. Tylock (PDF)
The SysAdmin's Court: Liz Action vs. Jack Trades by Steven M. Tylock (PDF)
BOOK REVIEWS
The Bookworm by Peter H. Salus and reviews of Brian Shea: Have You Locked the Castle Gates?
reviewed by Chuck Hardin, and of John Viega and Gary McGraw: Building Secure Software, reviewed by Nina Karhuluoma. (PDF)
SAGE NEWS (PDF)